Skip to content
Explore All

PDF.js CVE-2024-4367


Course
Upgrade subscription below

CVE-2024-4367 allows an attacker to execute arbitrary JavaScript code as soon as a malicious PDF file is opened.

This is a classic PDF-based XSS attack vector. When a PDF reader processes this file, it might execute the embedded JavaScript code, which would then reveal sensitive cookie information to an attacker. The attack attempts to extract authentication tokens or session identifiers stored in cookies, which could lead to session hijacking.

This particular technique uses the FontMatrix parameter, which is supposed to contain numbers for font transformation, but has been abused to contain executable code that doesn't belong there.

  • Verify and deploy a vulnerable application as a Docker Contianer
  • Exploit using custom payloads
  • Detect threats using runtime security tools like Falco
  • Enforce best practices and secure container environments against breaches

Ideal for Security Professionals, Devops Teams, and Penetration Testers

 

Here is the course outline:

PDF.js CVE-2024-4367

Completion

The following certificates are awarded when the course is completed:

CPE Credit Certificate